Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Handbook of Information Systems Research

Buy
This book provides a fresh perspective on issues related to IS research by providing chapters from world-renowned leaders in IS research along with chapters from relative newcomers who bring some interesting and often new perspectives to IS research.

The field of information systems research is undergoing subtle changes as it seeks to adopt, retool and implement many of the methodologies and techniques currently used. Researchers confronted with the demand for presenting new findings currently peruse and scrutinize dozens of IS academic and trade publications to learn how to properly use and read the results of the techniques used. Increased interest in the field demands a centralized collection of works on IS research.

The Handbook of Information Systems Research is for both researchers and instructors of IS research methodology. With the increased costs and complications associated with creating anthologies of previously published works, the authors created this new book to present research methodology and techniques currently under-represented in available publications.

About the Authors

Michael Whitman is an Associate Professor of Information Systems in the Department of Computer Science and Information Systems at Kennesaw State University, GA. He is also the Director of the Master of Science in Information Systems and Director of the Center for Information Security Education and Awareness at Kennesaw State University, USA. Dr. Whitman received his Ph.D. in Management Information Systems, an MBA and a Bachelor’s Degree in Management from Auburn University. Dr. Whitman’s current research interests include information security, security policy, computer use ethics and IS research methods.

Amy Woszczynski is an Assistant Professor of Information Systems in the Department of Computer Science and Information Systems at Kennesaw State University. She received her Ph.D. in Industrial Management from Clemson University, her MBA from Kennesaw State University, and a Bachelor's Degree in Industrial Engineering at Georgia Tech.

(HTML tags aren't allowed.)

Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran

As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of America’s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran’s efforts to develop into a nuclear power...

2: Cartilage and Osteoarthritis (Methods in Molecular Medicine)
2: Cartilage and Osteoarthritis (Methods in Molecular Medicine)
Osteoarthritis (OA), the most common form of arthritis, is generally characterized by a slowly progressive degeneration of articular cartilage, particularly in the weight-bearing joints. It has a stronger prevalence in women, and its incidence increases with age. OA is a major and growing health concern in developed countries,...
LPIC-2 Linux Professional Institute Certification Study Guide: Exams 201 and 202
LPIC-2 Linux Professional Institute Certification Study Guide: Exams 201 and 202

Why should you learn about Linux? It’s a fast-growing operating system, and it’s inexpensive and flexible. Linux is also a major player in the small and mid-sized server field, and it’s an increasingly viable platform for workstation and desktop use as well. By understanding Linux, you’ll...


Foundation Flash 8 Video
Foundation Flash 8 Video
In this book you'll learn:

  • The basics of video editing using Movie Maker 2, iMovie, and more

  • How to import your video into Flash

  • How to work with Flash Video components

  • Several of the new features of Flash 8, including alpha channels, filters,...
Java SOA Cookbook
Java SOA Cookbook
Java SOA Cookbook offers practical solutions and advice to programmers charged with implementing a service-oriented architecture (SOA) in their organization. Instead of providing another conceptual, high-level view of SOA, this cookbook shows you how to make SOA work. It's full of Java and XML code you can insert directly into your applications and...
The Encyclopedia Of International Organized Crime (Facts on File Crime Library)
The Encyclopedia Of International Organized Crime (Facts on File Crime Library)
As a reporter, columnist, and author who has written extensively about organized crime for more than three decades, my primary beat has been what is referred to by the Federal Bureau of Investigation (FBI) as “traditional organized crime.” In official court documents, the FBI identifies the organization as La Cosa Nostra (LCN). Most...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy